{"id":"https://openalex.org/W7101386231","doi":"https://doi.org/10.1109/ton.2025.3625606","title":"Noise Resistant Encrypted Malicious Traffic Detection Through Kernel-Enhanced Contrastive View Alignment","display_name":"Noise Resistant Encrypted Malicious Traffic Detection Through Kernel-Enhanced Contrastive View Alignment","publication_year":2025,"publication_date":"2025-10-28","ids":{"openalex":"https://openalex.org/W7101386231","doi":"https://doi.org/10.1109/ton.2025.3625606"},"language":"en","primary_location":{"id":"doi:10.1109/ton.2025.3625606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2025.3625606","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Meihui Zhong","orcid":"https://orcid.org/0009-0009-5764-2147"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meihui Zhong","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ting Zhong","orcid":"https://orcid.org/0000-0002-8163-3146"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Zhong","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yong Wang","orcid":"https://orcid.org/0000-0002-8699-8355"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yong Wang","raw_affiliation_strings":["The Hong Kong University of Science and Technology, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"The Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kai Chen","orcid":"https://orcid.org/0000-0003-2587-6028"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"last","author":{"id":null,"display_name":"Fan Zhou","orcid":"https://orcid.org/0000-0002-8038-8150"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhou","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":7.0705,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.9708873,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"34","issue":null,"first_page":"1511","last_page":"1523"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.8934000134468079,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.8934000134468079,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.014600000344216824,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.0142000000923872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6175000071525574},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.49619999527931213},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.37059998512268066},{"id":"https://openalex.org/keywords/adjacency-list","display_name":"Adjacency list","score":0.3693999946117401},{"id":"https://openalex.org/keywords/traffic-sign-recognition","display_name":"Traffic sign recognition","score":0.35120001435279846},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.3488999903202057},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.3330000042915344},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.33239999413490295},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.3052000105381012}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7558000087738037},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6175000071525574},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.49619999527931213},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4129999876022339},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38909998536109924},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.37059998512268066},{"id":"https://openalex.org/C110484373","wikidata":"https://www.wikidata.org/wiki/Q264398","display_name":"Adjacency list","level":2,"score":0.3693999946117401},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3544999957084656},{"id":"https://openalex.org/C6528762","wikidata":"https://www.wikidata.org/wiki/Q1574298","display_name":"Traffic sign recognition","level":4,"score":0.35120001435279846},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.3488999903202057},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33570000529289246},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.3330000042915344},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.33239999413490295},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.3052000105381012},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2913999855518341},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.2912999987602234},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.28029999136924744},{"id":"https://openalex.org/C2778180026","wikidata":"https://www.wikidata.org/wiki/Q18378163","display_name":"Semantic heterogeneity","level":4,"score":0.27070000767707825},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.26969999074935913},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C180356752","wikidata":"https://www.wikidata.org/wiki/Q727035","display_name":"Adjacency matrix","level":3,"score":0.26269999146461487},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.25870001316070557},{"id":"https://openalex.org/C16311509","wikidata":"https://www.wikidata.org/wiki/Q4148050","display_name":"Dependency graph","level":3,"score":0.25110000371932983},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ton.2025.3625606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2025.3625606","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-167209","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-167209","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3976612152","display_name":null,"funder_award_id":"62176043","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5983462902","display_name":null,"funder_award_id":"62072077","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G680623718","display_name":null,"funder_award_id":"U22A2097","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Encrypted":[0],"Malicious":[1],"Traffic":[2],"Detection":[3],"(EMTD)":[4],"is":[5],"challenging":[6],"due":[7],"to":[8,38,45,66,77,130],"the":[9,16,75,79,126,160,172,179],"limitations":[10],"of":[11,18,82,140],"inspecting":[12],"encrypted":[13,83],"content":[14],"and":[15,42,70,156,166],"scarcity":[17],"labeled":[19],"data.":[20],"Graph":[21],"Contrastive":[22,55],"Learning":[23,56],"(GCL)":[24],"offers":[25],"a":[26,53,88,118],"promising":[27],"direction":[28],"by":[29,174],"representing":[30],"traffic":[31,72,141],"as":[32],"graphs,":[33],"yet":[34],"existing":[35],"approaches":[36],"struggle":[37],"capture":[39,67],"global":[40,71],"relationships":[41],"remain":[43],"vulnerable":[44],"noise.":[46],"To":[47,111],"address":[48],"these,":[49],"we":[50,86,116],"propose":[51,87],"KerCL,":[52],"Kernel-Enhanced":[54],"framework":[57],"for":[58],"robust":[59],"EMTD.":[60],"KerCL":[61,149,170],"introduces":[62],"kernel-based":[63],"graph":[64,90],"convolution":[65],"both":[68],"local":[69],"dependencies,":[73],"enhancing":[74],"ability":[76],"understand":[78],"long-range":[80],"context":[81],"traffic.":[84],"Furthermore,":[85],"dependency-guided":[89],"reconstruction":[91],"strategy,":[92],"which":[93],"restructures":[94],"adjacency":[95],"matrices":[96],"based":[97],"on":[98,144],"learned":[99],"kernel":[100],"similarities,":[101],"ensuring":[102],"structural":[103],"integrity":[104],"while":[105,137],"improving":[106],"diversity":[107],"in":[108,153],"augmented":[109,135],"views.":[110],"reduce":[112],"noise-induced":[113],"semantic":[114,132],"drift,":[115],"introduce":[117],"novel":[119],"contrastive":[120],"dependency":[121],"alignment":[122],"mechanism.":[123],"It":[124],"leverages":[125],"Hilbert-Schmidt":[127],"independence":[128],"criterion":[129],"enforce":[131],"consistency":[133],"across":[134],"views":[136],"preserving":[138],"stability":[139],"representations.":[142],"Experiments":[143],"several":[145],"benchmarks":[146],"show":[147],"that":[148],"surpasses":[150],"previous":[151],"methods":[152],"consistency,":[154],"robustness,":[155],"noise":[157,165],"tolerance.":[158],"On":[159],"DoHBrw":[161],"dataset":[162],"with":[163,178],"50%":[164],"only":[167],"2,000":[168],"labels,":[169],"improves":[171],"F1-score":[173],"over":[175],"28%":[176],"compared":[177],"best":[180],"baseline,":[181],"showcasing":[182],"its":[183],"effectiveness":[184],"under":[185],"noisy,":[186],"label-sparse":[187],"network":[188],"conditions.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-28T00:00:00"}
